| Title: | FDDI - The Next Generation |
| Moderator: | NETCAD::STEFANI |
| Created: | Thu Apr 27 1989 |
| Last Modified: | Thu Jun 05 1997 |
| Last Successful Update: | Fri Jun 06 1997 |
| Number of topics: | 2259 |
| Total number of notes: | 8590 |
On a DEC7000 with DEMFA running OSF/1 V1.3, we get ICMP ECHO_RESPONSE duplicate packets quite often when we use the ping command. 137.132.1.1 is a proteon router on the same ring. Anyone know what the general cause of this is? Script started on Thu Oct 21 14:36:44 1993 leonis:~> ping 137.132.1.1 PING 137.132.1.1 (137.132.1.1): 56 data bytes 64 bytes from 137.132.1.1: icmp_seq=0 ttl=59 time=2 ms 64 bytes from 137.132.1.1: icmp_seq=1 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=2 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=3 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=4 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=5 ttl=59 time=1 ms 64 bytes from 137.132.1.1: icmp_seq=6 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=7 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=8 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=9 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=10 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=11 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=12 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=13 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=14 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=15 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=16 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=17 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=18 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=19 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=19 ttl=59 time=2 ms (DUP!) 64 bytes from 137.132.1.1: icmp_seq=20 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=21 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=22 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=23 ttl=59 time=15 ms 64 bytes from 137.132.1.1: icmp_seq=24 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=24 ttl=59 time=2 ms (DUP!) 64 bytes from 137.132.1.1: icmp_seq=25 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=26 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=27 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=28 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=29 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=30 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=31 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=32 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=33 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=34 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=35 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=36 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=37 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=38 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=39 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=40 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=41 ttl=59 time=1 ms 64 bytes from 137.132.1.1: icmp_seq=42 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=42 ttl=59 time=1 ms (DUP!) 64 bytes from 137.132.1.1: icmp_seq=43 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=44 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=45 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=46 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=47 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=48 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=49 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=50 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=50 ttl=59 time=1 ms (DUP!) 64 bytes from 137.132.1.1: icmp_seq=51 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=52 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=53 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=54 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=55 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=56 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=57 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=58 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=59 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=60 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=60 ttl=59 time=1 ms (DUP!) 64 bytes from 137.132.1.1: icmp_seq=61 ttl=59 time=1 ms 64 bytes from 137.132.1.1: icmp_seq=61 ttl=59 time=2 ms (DUP!) 64 bytes from 137.132.1.1: icmp_seq=62 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=63 ttl=59 time=1 ms 64 bytes from 137.132.1.1: icmp_seq=64 ttl=59 time=1 ms 64 bytes from 137.132.1.1: icmp_seq=65 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=66 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=67 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=68 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=69 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=70 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=71 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=71 ttl=59 time=1 ms (DUP!) 64 bytes from 137.132.1.1: icmp_seq=72 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=73 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=74 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=75 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=76 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=77 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=78 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=79 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=80 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=81 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=82 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=83 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=84 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=85 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=86 ttl=59 time=1 ms 64 bytes from 137.132.1.1: icmp_seq=87 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=88 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=89 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=90 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=91 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=92 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=93 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=94 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=95 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=96 ttl=59 time=3 ms 64 bytes from 137.132.1.1: icmp_seq=97 ttl=59 time=1 ms 64 bytes from 137.132.1.1: icmp_seq=98 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=99 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=100 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=101 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=102 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=103 ttl=59 time=1 ms 64 bytes from 137.132.1.1: icmp_seq=104 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=105 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=106 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=107 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=108 ttl=59 time=2 ms 64 bytes from 137.132.1.1: icmp_seq=109 ttl=59 time=1 ms 64 bytes from 137.132.1.1: icmp_seq=110 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=111 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=112 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=113 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=114 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=115 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=116 ttl=59 time=0 ms 64 bytes from 137.132.1.1: icmp_seq=117 ttl=59 time=0 ms ^C ----137.132.1.1 PING Statistics---- 118 packets transmitted, 118 packets received, +7 duplicates, 0% packet loss round-trip (ms) min/avg/max = 0/0/15 ms leonis:~> exit script done on Thu Oct 21 14:38:52 1993
| T.R | Title | User | Personal Name | Date | Lines |
|---|---|---|---|---|---|
| 1121.1 | NETRIX::thomas | The Code Warrior | Thu Oct 21 1993 07:21 | 4 | |
Are you sure it isn't the proteon? Have you put an FDDI sniffer on LAN? Considering the way DEC OSF/1 does network input, I doubt it's being duplicated in the DEMFA input path. Could the proteon not be stripping its packets properly? Are you running the Ring Purger on this ring? | |||||
| 1121.2 | more information | ZPAC20::rick | Richard Tan - it's now or never | Thu Oct 21 1993 20:16 | 82 |
> Have you put an FDDI sniffer on LAN?
We will try to do this.
> Are you running the Ring Purger on this ring?
No - if I did, the DEMFA would freeze (literally) within minutes!
anyway, here's the output from "netstat -s -I mfa0":
mfa0 FDDI counters at Fri Oct 22 07:59:22 1993
65535 seconds since last zeroed
4294967295 ANSI MAC frame count
0 ANSI MAC frame error count
0 ANSI MAC frames lost count
4294967295 bytes received
2742590340 bytes sent
32557797 data blocks received
19510962 data blocks sent
207152955 multicast bytes received
854410 multicast blocks received
1844752 multicast bytes sent
24342 multicast blocks sent
0 transmit underrun errors
0 send failures
0 FCS check failures
0 frame status errors
0 frame alignment errors
0 frame length errors
0 unrecognized frames
0 unrecognized multicast frames
0 receive data overruns
0 system buffers unavailable
0 user buffers unavailable
0 ring reinitialization received
36 ring reinitialization initiated
0 ring beacon process initiated
0 ring beacon process received
0 duplicate tokens detected
0 duplicate address test failures
0 ring purger errors
0 bridge strip errors
0 traces initiated
0 traces received
0 LEM reject count
0 LEM events count
0 LCT reject count
0 TNE expired reject count
1 Completed Connection count
0 Elasticity Buffer Errors
mfa0 FDDI status
Adapter State: Running State
LED State: Yellow/Green
Link State: On Ring Running
Duplicate Address Condition: Absent
Ring Purger State: Purger off
Negotiated TRT: 7.987 ms
Upstream Neighbor Address: 00-00-93-00-C0-F6
UNA Timed Out: False
Downstream Neighbor Address: 08-00-2B-34-B6-5B
Ring Error Reason: Ring Init Received
Physical Port State: In Use
Neighbor Physical Port Type: Master
Reject Reason: Unknown
Physical Link Error Estimate: 15
mfa0 FDDI characteristics
Link Address: 08-00-2B-37-DC-63
Firmware Revision: V1.4
Hardware Revision: V5
SMT Version ID: 1
Requested TRT: 7.987 ms
Maximum TRT: 173.015 ms
Valid Transmission Time: 2.621 ms
LEM Threshold: 8
Restricted Token Timeout: 7705.600 ms
PMD Type ANSI Multimode
| |||||
| 1121.3 | NETRIX::thomas | The Code Warrior | Thu Oct 21 1993 21:13 | 1 | |
Why would the DEMFA freeze if you ran Ring Purger? | |||||
| 1121.4 | same (sort of) question | CSC32::PITT | Thu Aug 18 1994 08:44 | 14 | |
Similar problem: when customer ran netsetup and configured his defta,
he got "duplicate token found". As with the basenote, he does also
ocasionally get the dup packet on ping.
His ring consists of 7 alpha boxes (3000/300s with DEFTAs) a Cray and a
mystery...(may be a Proteon- he's not sure). He doesn't remember
getting that duplicate token found when configuring his other nodes.
Can you explain what a Ring Purger is? Would it eliminate this
problem? Is this what it sounds like it might be--some sort of echo
that the system is seeing as a valid packet???? Thanks!!!!!!!
| |||||
| 1121.5 | koning.lkg.dec.com::koning | Paul Koning, B-16504 | Thu Aug 18 1994 17:37 | 8 | |
Yes, the ring purger may help. Certainly it will help detect duplicate token problems (and as soon as they are detected, they are corrected by doing a Claim). However, a significant rate of duplicate tokens (more than a few per day) is a sign of something quite strange going on in your network. paul | |||||